A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks

S Dong, H Su, Y Xia, F Zhu, X Hu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …

[PDF][PDF] Reliable and efficient data dissemination scheme in VANET: a review

SA Rashid, L Audah, MM Hamdi… - International Journal of …, 2020 - researchgate.net
Vehicular ad-hoc network (VANET), identified as a mobile ad hoc network MANETs with
several added constraints. Basically, in VANETs, the network is established on the fly based …

Review of prevention schemes for replay attack in vehicular ad hoc networks (vanets)

MA Al-shareeda, M Anbar, IH Hasbullah… - 2020 IEEE 3rd …, 2020 - ieeexplore.ieee.org
Vehicular Ad hoc Networks (VANETs) are self-organizing wireless communication networks
that allow vehicles to exchange traffic-related messages automatically with neigh-boring …

[PDF][PDF] IoT based implemented comparison analysis of two well-known network platforms for smart home automation

S Alani, SN Mahmood, SZ Attaallah… - Int. J. Electr. Comput …, 2021 - academia.edu
The developments of the internet of things (IoT) technologies fascinated the universe and
provided great opportunities to introduce these innovations in smart house networks. Smart …

[PDF][PDF] Secured node detection technique based on artificial neural network for wireless sensor network.

B Hasan, S Alani, MA Saad - International Journal of Electrical & …, 2021 - core.ac.uk
The wireless sensor network is becoming the most popular network in the last recent years
as it can measure the environmental conditions and send them to process purposes. Many …

[PDF][PDF] Total energy consumption analysis in wireless mobile ad hoc network with varying mobile nodes

MA Saad, HJ Alhamdane, SAH Ali… - Indonesian Journal of …, 2020 - researchgate.net
The energy protocols that have a mechanisms of shortest path routing considered
predominant in the networking scenarios. The interesting matter in the routing protocols …

Cyber-security threats and vulnerabilities in 4G/5G network enabled systems

S Mishra - International Journal of Computational Science …, 2022 - inderscienceonline.com
In the era of 4G and 5G networks, many cyber-security issues have arisen. Security is an
important issue that should not be overlooked. The security system consists of …

[PDF][PDF] Performance Evaluation of Two Mobile Ad-hoc Network Routing Protocols: Ad-hoc On-Demand Distance Vector Dynamic Source Routing

J Alamri, AS Al-Johani, KI Ata - International Journal of Advanced …, 2020 - researchgate.net
A mobile ad-hoc network is a collection of mobile nodes that goatherd to exchange data and
information from source to destination. Typically, MANET has no infrastructure, which can …

[PDF][PDF] What network simulator questions do users ask? a large-scale study of stack overflow posts

S Islam, YS Nugroho, MJ Hossain - Indonesian Journal of Electrical …, 2021 - academia.edu
The use of network simulator as a modern tool in analyzing and predicting the behaviour of
computer networks has grown to reduce the complexity of its accuracy measurement. This …

Exploring Attitudes Concerning The Applying Of Mobile Learning In Technical Education With Responsibility And Generativity

MM Kareem, SAS Lafta, RK Ibrahim… - 2022 8th …, 2022 - ieeexplore.ieee.org
Mobile learning is a real issue that has attracted the interest of a students and academics.
Despite the fact that m-learning is quickly growing around the world, research into students' …